Reverse-shell as a tool for gaining unauthorized access

DOI: 10.31673/2409-7292.2022.013437

Authors

  • В. Є. Маницький, (Manytsʹkyy V. Ye.) State University of Telecommunications, Kyiv

DOI:

https://doi.org/10.31673/2409-7292.2022.013437

Abstract

This article analyzes the ways and consequences of using a tool such as Reverse Shell in attacks on servers. What is the main danger, what is the scheme of this connection from the "victim" to the attacker and what tools are used to prepare for the attack. Basic recommendations on protection and prevention of attacks using the reverse shell are also provided, which include both engineering and technical means of information protection and work with personnel.

Keywords: cyberattack, attacker, malware, script, unauthorized access, shell.

References
1. What is a Reverse Shell? [Електронний ресурс] – Режим доступу до ресурсу: https://www.techslang.com/definition/what-is-a-reverse-shell/
2. Windows-php-reverse-shell [Електронний ресурс] – Режим доступу до ресурсу: https://github.com/Dhayalanb/windows-php-reverse-shell
3. Metasploit [Електронний ресурс] – Режим доступу до ресурсу: https://docs.rapid7.com/metasploit/
4. Php-reverse-shell [Електронний ресурс] – Режим доступу до ресурсу:https://pentestmonkey.net/tools/web-shells/php-reverse-shell

Published

2022-06-20

Issue

Section

Articles